Campus ID News
Card, mobile credential, payment and security
FEATURED
PARTNERS
slider Clemson 1

Clemson consolodates, updates access control

University unifies fragmented access systems, moves away from prox

CampusIDNews Staff   ||   Dec 15, 2017  ||   ,

At Clemson University, the TigerOne card office’s latest endeavor is creating a new access control system, a pursuit that began in 2012. Steve Robbins, the Executive Director of the TigerOne card office, and Matthew Tegen, the Director of Systems for the TigerOne card office, presented their project and discussed what they wanted to accomplish, the current status of their project, and what they have learned so far.

During a presentation given at NACCU 2017, the pair discussed the highlights and major components of the project at Clemson.

One of the goals of the project was combining four different access systems that have in place for over twenty years: Picture Perfect, Secure Perfect, Von Duprin, and Onity. Having multiple systems in place simultaneously presented certain security and safety risks, and all four systems leveraged either magnetic stripe or prox technology. “Safety is the driver – everything else takes a backseat to that. Safety is the justification for everything,” Tegen says.

Having multiple systems presented safety issues. For example, if the police have access to two or three systems and don’t have access to the fourth system, it can be a potential public safety threat if authorities can't quickly access a building.

Manual data entry posed another risk. Two of the systems, Von Duprin and Onity, leveraged the comparably less secure magnetic stripe, while Picture Perfect and Secure Perfect leverage prox. Clemson was also seeking to remove outdated systems and move toward card encryption to prevent copying. Picture Perfect was no longer receiving security updates and the IT department didn’t feel comfortable using it.

One of the first steps in the security overhaul was to determine the stakeholders in the project. One of the major stakeholders are building security coordinators.

At Clemson, each building is assigned a building security coordinator who in turn has control over cardholder groups, sets schedules on doors, controls buildings' security systems, and decides who receives access privileges. Department system administrators, the departments, students, and faculty, were also crucial stakeholders.

Determining project goals

Once Robbins and Tegen finished defining what their project was in their project charter, they needed to create an outline and requirements for it. For this, the steering committee helped identify members for a project team that included a total of twenty people from the campus police department, academics, IT, facilities and the financial department.

“We tried to turn over every stone there was of key stakeholders and identify the essential areas that needed to be represented,” Robbins says.

Together, they created the details for the requirements of their access control system, developed a policy for the access control system, and made budget projections.

Subscribe to our weekly newsletter

RECENT POSTS

May 26, 23 / ,

Penn State adds mobile ordering to campus app

Penn State has added a mobile ordering feature to its comprehensive campus mobile app, Penn State Go. The Penn State Eats Mobile function is available for use by students on the flagship University Park campus, as well as across the university's Commonwealth Campuses.
May 26, 23 / ,

NAU leverages delivery robots to support late-night dining

Northern Arizona is leveraging Starship delivery robots and the mobile ordering app in a clever way to prop up late night dining, and putting a twist on the ghost kitchen concept. The university has launched its Hole in the Wall dining window that now serves either pickup or robot delivery for students by offering a number of dining concepts all from a single, concession-style window.
May 25, 23 / ,

HID's Technology Partner Program helps companies develop mobile solutions

Trusted identity solutions provider, HID Global, has announced its HID Origo Technology Partner Program, the company’s first program dedicated to partners with a focus on mobile technologies. The Origo Technology Partner Program is designed to help technology partners by providing the ideal platform for organizations to design, test, and market products that integrate with HID Origo via APIs and SDKs.
CIDN logo reversed
The only publication dedicated to the use of campus cards, mobile credentials, identity and security technology in the education market. CampusIDNews – formerly CR80News – has served more than 6,500 subscribers for more than two decades.
Twitter

Join us, @NACCUorg, and @TouchNet to explore how campus card programs can successfully navigate the sales and procurement process. Join the webinar on June 6, 2 pm EDT. https://go.touchnet.com/l/652093/2022-05-18/lsndq

Webinar: Learn how the University of Arizona uses campus cards, mobile ordering, kiosks, lockers, and robots to revolutionize campus dining. April 7, 2-2:30 EDT. Register Now at https://register.gotowebinar.com/register/7821245544009488910?source=campus-id

Load More...
Contact
CampusIDNews is published by AVISIAN Publishing
315 E. Georgia St.
Tallahassee, FL 32301
www.AVISIAN.com[email protected]
Use our contact form to submit tips, corrections, or questions to our team.
©2023 CampusIDNews. All rights reserved.